![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors.
Intellectual property owners must continually exploit new ways of
reproducing, distributing, and marketing their products. However,
the threat of piracy looms as a major problem with digital
distribution and storage technologies.
This book develops a theory for transactions that provides practical solutions for system developers, focusing on the interface between the user and the database that executes transactions. Atomic transactions are a useful abstraction for programming concurrent and distributed data processing systems. Presents many important algorithms which provide maximum concurrency for transaction processing without sacrificing data integrity. The authors include a well-developed data processing case study to help readers understand transaction processing algorithms more clearly. The book offers conceptual tools for the design of new algorithms, and for devising variations on the familiar algorithms presented in the discussions. Whether your background is in the development of practical systems or formal methods, this book will offer you a new way to view distributed systems.
Cryptography for Developers gives developers the practical cryptographic tools they need in their daily work. It also provides them the contextual knowledge to understand how these 21st-century cryptographic tools have been fashioned in response to theoretical and technological advances in mathematics and computers that rendered the paradigms of classic and late 20th-century cryptography obsolete. The book focuses on the recipes for algorithms most commonly deployed by developers in practical applications, without delving into the details of the mathematical theory underlying them. The technical presentation of each algorithm in code is accompanied by a narrative account of the algorithm's applications and historical development. Depending on the reader's interest level, Cryptography for Developers may be read in its entirety or in its thematic parts, either as a technical manual of algorithms or as an introductory survey of modern cryptography. The technical heart of Cryptography for Developers describes cryptographic algorithms in current use, explains how they work and how to use them, and provides abundant practical examples from the libraries of popular programming languages, including Ruby, Java, C, PHP, JavaScript, Python, and Perl. Software architect Jose Maria Estevez proceeds to demonstrate with plentiful examples the protocols for combining algorithms and the methods for solving cryptographic problems commonly encountered by developers. The narrative portion of the book surveys the development of classical cryptography from ancient Athens through World War II, the computerization of cryptography in the second half of the 20th century, the explosive growth and proliferation of modern cryptography since the turn of the 21st century, and the forecast for future cryptographic developments driven by quantum computing and other technological and social trends.
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A--Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification Block ciphers and stream ciphers Computational issues Copy protection Cryptanalysis and security Cryptographic protocols Electronic payment and digital certificates Elliptic curve cryptography Factorization algorithms and primality tests Hash functions and MACs Historical systems Identity-based cryptography Implementation aspects for smart cards and standards Key management Multiparty computations like voting schemes Public key cryptography Quantum cryptography Secret sharing schemes Sequences Web security The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject.
Digital evidence is increasingly critical in an age of widespread Internet use, consumer-based email, digital contracts, digital correspondence, digitized business processes and records and digitized government. One needs to prove what went wrong in or near a computer-- whether a major crime, a dispute about a failed contract to deliver goods or services, a minor dispute within a business, or just an accident that generates legal proceedings or an insurance claim. The challenge is how to capture that evidence in ways that meet the needs of the legal system and also convince judges and juries lacking computer expertise. The problems of "digital evidence" are not the exclusive preserve of elite cyber-sleuths chasing hackers across the Internet. Anyone who uses a computer, relies on computer data, designs computer systems, or advises those who do needs to understand where and how much evidence can be located, how it should be preserved free from contamination, how it may best be analyzed, and how to present it in statements, affidavits, and court. The "Handbook of Digital Evidence and Forensics" will provide coverage of: *some basic principles about forensic science--its obligations, disciplines, professional practices, etc. *the application and development of these principles to specific types of computer-derived evidence (such as documents, database records, data from disks and other storage media, and data intercepted in transmission) *specific procedures and techniques for safe acquisition, analysis and presentation of particular types of evidence *presentation skills for written and oral evidence
Security and Survivability presents new research on the emerging discipline of design and analysis of security systems that are survivable. Such systems are designed to continue to provide verifiable security guarantees, and allow the system to degrade gracefully, even under threat or actual incidence of attack. The book introduces a theory of recovery-oriented security and provides well-developed case studies that corroborate the utility of the theory, addressing privilege-escalation and Denial of Service (DoS) attacks. Using their automated verification methodology, the authors formally prove for the first time whether strategies such as selective filtering, strong authentication, and client puzzles actually reduce the vulnerability of a network to DoS attacks.
New medical privacy rules (HIPAA) are having a profound impact on all medical practices. In an easy-to-follow Q&A format based on his sold-out courses, Ofer Zur addresses over one hundred questions about these often-confusing regulations, including: What are the basic requirements for compliance? How is therapist-patient privacy protected? Do managed care companies have a right to review my notes? Can I say the name of my patient in my waiting room? What do I need to know regarding my phone?A CD-ROM is included, providing you with simple checklists and ready-to-apply HIPAA forms that you will be able to personalist and utilize in your practice.
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging content prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks, and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. This edition offers a tightened focus on key executive and managerial aspects of information security while still emphasizing the foundational material to reinforce key concepts. Updated content reflects the most recent developments in the field, including NIST, ISO, and security governance.
Providing the perfect blend of basic security theory and practical software security programming, Software Security Technologies: A Programmatic Approach offers a valuable introduction to the field of software security. Divided into three parts, this comprehensive guide encourages readers to master their security skills by building on the basics. The first section of the book is devoted to fundamental security theories that govern common software security technical issues. Coverage then progresses to a focus on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. Using these theories and programming practices as a foundation, the book concludes with a section on security in practice, demonstrating how the conceptual and practical materials covered in the first two sections are applied in real-world scenarios. All of these topics are explained using a straightforward approach, so that readers can grasp the information quickly and easily, gaining the confidence they need to further develop their skills in software security technologies. |
![]() ![]() You may like...
Countdown 1960 - The Behind-The-Scenes…
Chris Wallace, Mitch Weiss
Hardcover
Characteristics of Distributed-Parameter…
A.G. Butkovskii, L.M. Pustyl'nikov
Hardcover
R3,315
Discovery Miles 33 150
Irish Migrants in New Communities…
Micheal O'hAodha, Mairtin O. Cathain
Hardcover
R2,476
Discovery Miles 24 760
Key Technologies of Intelligentized…
Yiming Huang, Shan-Ben Chen
Hardcover
R2,873
Discovery Miles 28 730
Portfolio and Investment Analysis with…
John B. Guerard, Ziwei Wang, …
Hardcover
R2,395
Discovery Miles 23 950
Friction Stir Welding - Dissimilar…
Noor Zaman Khan, Arshad Noor Siddiquee, …
Hardcover
R5,161
Discovery Miles 51 610
|